General
-
Target
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da
-
Size
217KB
-
Sample
221030-pg85hsadc8
-
MD5
a28ebe523e552baf86efc4c29cbe3b66
-
SHA1
f32fe77693914c4afb90193d37496a8b43d7dc23
-
SHA256
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da
-
SHA512
d044e586674da4c8f49477023961e73c30d9df2ebf270e34136077bcb02d1fd79526d386ad4cd0f9937a1eba38d066a254c99964f67a41c7aa7cbf5574fc8bca
-
SSDEEP
6144:bKg3WR3nKrBxUvhVyUH4aAt9rOLLpuPPmE:bKNR3KrBA+6At9regXmE
Static task
static1
Behavioral task
behavioral1
Sample
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da
-
Size
217KB
-
MD5
a28ebe523e552baf86efc4c29cbe3b66
-
SHA1
f32fe77693914c4afb90193d37496a8b43d7dc23
-
SHA256
aaa515a7e53fc79c7f7b55b6ed4fbeabb6cfde8e369420d8f2b10b5229ce22da
-
SHA512
d044e586674da4c8f49477023961e73c30d9df2ebf270e34136077bcb02d1fd79526d386ad4cd0f9937a1eba38d066a254c99964f67a41c7aa7cbf5574fc8bca
-
SSDEEP
6144:bKg3WR3nKrBxUvhVyUH4aAt9rOLLpuPPmE:bKNR3KrBA+6At9regXmE
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-